Images List Premium Download Classic

Public Key

Public Key-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Authenticating features of virtual server system
International Business Machines Corporation
April 12, 2018 - N°20180102899

Technical solutions are described for authenticating a hosting system prior to securely deploying a shrouded virtual server. An example method includes receiving, by a hypervisor, a request for a public certificate, from a client device that requested the virtual server, and sending the public certificate of the hosting system that executes the hypervisor. The method also includes receiving, in response ...
Method for issuing, using, refunding, settling and revocating electronic voucher using updated status of balance ...
Coinplug, Inc.
April 12, 2018 - N°20180101844

A method of issuing an electronic voucher by an issuer is provided. The method includes steps of: (a) creating and registering a transaction including a voucher data, a public key and a signature value of the issuer, with a private blockchain database, providing the issuer with a privtxid locating the transaction in the private blockchain database, and updating and registering ...
Method and system for identity and credential protection and verification via blockchain
Mastercard International Incorporated
April 12, 2018 - N°20180101684

A method for distributed storage of identity data includes: receiving entity data for a plurality of entities, the data including an associated public key, associated attributes, and a geographic jurisdiction, and where one entity is a subordinate; generating a data file for each entity including the associated attributes and public key, and where the subordinate entity's data file includes a ...
Public Key Patent Pack
Download 182+ patent application PDFs
Public Key Patent Applications
Download 182+ Public Key-related PDFs
For professional research & prior art discovery
inventor
  • 182+ full patent PDF documents of Public Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Detecting malicious usage of certificates
Microsoft Technology Licensing, Llc.
April 05, 2018 - N°20180097803

The misuse of public key, private key, and public/private key certificates poses significant security challenges to computer networks that are addressed by certificate monitoring. Certificate monitoring allows network administrators to detect and remedy poor security practices related to public key certificates and to detect and combat the malicious use of public key certificates in a centralized environment. Best practices ...
Certificate authority master key tracking on distributed ledger
The Toronto-dominion Bank
April 05, 2018 - N°20180097638

An apparatus for use in a digital messaging system includes a storage device and a processor coupled to the storage device. The storage device storing software instructions for controlling the processor that when executed by the processor configured the processor to: generate a master private and public key pair; associate the master private and public key pair with a first ...
Methods and apparatus for providing blockchain participant identity binding
Entrust, Inc.
April 05, 2018 - N°20180097635

A method and apparatus provides a blockchain that includes one or more blocks that contain a cryptographic binding of a signature-verification public key and/or a data encryption public key to the identity of the holder of the corresponding private key. The binding is performed by one or more key binding entities, referred to herein as a blockchain identity binder. ...
Public Key Patent Pack
Download 182+ patent application PDFs
Public Key Patent Applications
Download 182+ Public Key-related PDFs
For professional research & prior art discovery
inventor
  • 182+ full patent PDF documents of Public Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method for payment authorization on offline mobile devices with irreversibility assurance
Matera Systems Inc.
April 05, 2018 - N°20180096348

A methods for payment authorization (10) on mobile devices (dm) such as smartphones, tablets or any others available, which may be offline; the method for payment authorization (10) comprises the compilation of sequential steps of method (m1) of the payer (20) with method (m2) of the operational system (50) or application that constitutes a logical structure for alignment with the method (m3) of the ...
System and method for transforming channel id communications in man-in-the-middle context
International Business Machines Corporation
March 29, 2018 - N°20180091552

Embodiments can provide a computer implemented method in a data processing system comprising a processor and a memory comprising instructions, which are executed by the processor to cause the processor to implement a system for transforming a channel id communication, the method comprising: generating, by a ssl/tls inspector, a secret; receiving, from a client, a channel id communication comprising ...
Electronic device, server and communication system for securely transmitting information
Synology Incorporated
March 29, 2018 - N°20180091487

An electronic device, server, and communication system are disclosed. The electronic device includes a processor and a storage medium. The storage medium is configured to store a plurality of instructions to allow the processor to generate a public key and a private key, to encrypt the private key, and to send the public key and the encrypted private key through ...
Printing apparatus, control method of printing apparatus, and network system
Seiko Epson Corporation
March 29, 2018 - N°20180091307

A printing apparatus includes: a printing apparatus storage unit that stores firmware to which a public key is added, the public key being information related to a public key encryption method; a printing apparatus network-communication unit that receives signature information obtained by encrypting a hash value of overwriting firmware with a private key corresponding to the public key, from the ...
Method and system for switching public keys in ciphertexts
Zerodb, Inc.
March 29, 2018 - N°20180091301

Provided is a process, including: obtaining a first ciphertext; obtaining the field size with which the first ciphertext was encrypted; obtaining a first private encryption key of the first encryption key pair; receiving a request to delegate access to the first ciphertext to a second recipient; obtaining a second private encryption key; determining a key-switching key based on the field ...
Integrity protected trusted public key token with performance enhancements
International Business Machines Corporation
March 29, 2018 - N°20180091299

Embodiments are directed to a computer-implemented method, computer system, and computer program product for creating a public key token. A public key and private key are generated, using a master key. A set of permissions is received for the public key and private key that note the allowable uses for the public key and private key. Thereafter, the set of ...
Architecture for access management
Tyco Integrated Security, Llc
March 29, 2018 - N°20180089971

Disclosed are techniques that render a graphical user interface on a display device for performing transactions with a security system. The techniques include listening by a user device for a beacon from the security system, the beacon including a message and imitating by the user device the transaction with the security system in response to the message, with the message ...
Public Key Patent Pack
Download 182+ patent application PDFs
Public Key Patent Applications
Download 182+ Public Key-related PDFs
For professional research & prior art discovery
inventor
  • 182+ full patent PDF documents of Public Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Secure control of profile policy rules
Apple Inc.
March 22, 2018 - N°20180084426

A secure element (se) in a device processes profile policy rule (ppr) update information received in a message. The se uses a rule authorization table (rat), when processing the message, to control whether a ppr on/off state will be adjusted. The ppr information identifies a profile. For example, a mobile network operator (mno) in control of the profile may ...
In-vehicle networking
Certicom Corp.
March 22, 2018 - N°20180084412

A system and method for securing communication across an in-vehicle bus, includes establishing a connection between a gateway in a vehicle and the in-vehicle bus; generating a session key at the gateway within the vehicle; transmitting a public key certificate and ephemeral key to the gateway and an electronic control unit of the vehicle; generating a shared secret at the ...
System and method for announcing cryptographic keys on a blockchain
March 22, 2018 - N°20180084042

A method and apparatus is presented for announcing the existence of cryptographic key pairs within a distributed ledger system in which no central trusted authority is available, consisting of sending a key announcement message by a network connected device to other network connected devices over a peer-to-peer network for inclusion in the distributed ledger. Once a valid key announcement message ...
Multi-session authentication
Ebay Inc.
March 22, 2018 - N°20180083955

An approach for multi-session authentication of multiple networked devices is disclosed. A user can create a public key-encrypted message on a client device using biometric data and a one-time password (e. G., one-time password). A door control box can transmit the public key-encrypted message to an authentication server. The authentication server can validate the user by decrypting the encrypted message ...
Method for operating server and client, server, and client apparatus
2ip Co., Ltd.
March 22, 2018 - N°20180083938

Disclosed is a method for operating a server supporting peer-to-peer communication. One embodiment comprises the steps of: issuing a public key in response to a public key request received from a client and transmitting the public key to the client; receiving a private key from the client and mapping the public key and private key as a key pair; receiving, ...
Binding data to a network in the presence of an entity with revocation capabilities
Red Hat, Inc.
March 22, 2018 - N°20180083778

Implementations of the disclosure provide for binding data to a network in the presence of an entity with revocation capabilities. A cryptographic system is provided that includes a memory to store revocation information comprising a plurality of identifiers and a processing device operatively coupled to the memory. A provisioning public key is recovered in view of a first intermediate public ...
Methods and systems for a digital trust architecture
United States Postal Service
March 22, 2018 - N°20180083771

In some aspects, methods and systems for a digital trust architecture are provided. In some aspects, the architecture includes a user account provisioning process. The provisioning process may make use of in person verifications of some personal information to ensure authenticity of the user information. Once the authenticity of user information is established, an account may be created. The user ...
Countersigning updates for multi-chip devices
Apple Inc.
March 22, 2018 - N°20180082065

A device facilitating countersigning updates for multi-chip devices includes at least one processor configured to receive, from a collocated chip, a data item and a software update, the data item being signed using a private key corresponding to a primary entity associated with the collocated chip and the data item comprising an authentication code generated using a symmetric key corresponding ...
Loading